Boost your digital fitness for cyber resilience in 2020 – and beyond

During this tumultuous year, digital tools have let us keep working even as we’ve shuttered once-busy office spaces, moved by the millions to home offices…

OpenText  profile picture
OpenText

November 04, 20203 min read

During this tumultuous year, digital tools have let us keep working even as we’ve shuttered once-busy office spaces, moved by the millions to home offices and learned to do many previously face-to-face tasks remotely. The result is that we’re more dependent than ever on technology – which leaves us more vulnerable than ever to cyber threats.

“Seriously, virtually nothing is the same as it was in 2019,” said Craig Stilwell, OpenText™ EVP and GM for SMB & Consumer, during his keynote presentation titled “Cyber Resilience in 2020 and Beyond” at OpenText™ World 2020.  “We’ve increased the surface area for the bad guys to go after, and we’ve never needed to be more resilient than we need to be right now.”

Ensuring your digital fitness

Craig described resilience as digital fitness – the ability to bounce back from an adverse event and return to living and working as normally as possible. Those events could be anything from spilled juice on a phone to a stolen laptop, from a data center fire to a cyber-attack.

Small businesses are especially vulnerable to such threats – 43% were the victims of security breaches in 2018, and 2019 saw 151.9 million ransomware attacks. In fact, cyber-attacks are becoming more sophisticated all the time, which means defense strategies need to continually keep up.

What’s more, Craig said, “the cost of not being resilient isn’t always measured in just hard dollars. It’s not only paying off the bad guys for the ransomware attack; it’s also the downtime and the loss of productivity.”

Developing a cyber resilience strategy

To prevent this, organizations need a cyber resilience strategy that keeps devices and data safe by identifying threats in real time and blocking them before they can do any damage.

“People often ask us, ‘How does this whole thing work?’” said Hal Lonas, SVP and CTO, SMB & Consumer. “’How does threat intelligence work? Where do you get the data from? How does it come together?’ Well, the key to this is having over 95 million global sensors, which are mostly our own products, which are treated as threat telemetry coming into the platform.”

All those devices and sensors provide more than six petabytes of information, representing over 840 million internet domains and 37 billion URLs. OpenText’s Webroot and Carbonite solutions use that information to identify and proactively block any online locations that could pose a threat to users.

For example, OpenText customer Menlo Security uses those tools to support its global cloud proxy service, which is essentially a cloud-based browser that directs customers’ web traffic through Menlo Security’s cloud servers. Menlo Security uses Webroot and Carbonite not only to prevent customers’ access to questionable sites but to provide them with insights about those threats.

That kind of threat intelligence is key to cyber resilience, providing users with greater context about different locations on the web, and how these fit into the threat landscape. As Hal summarized, “The importance of this, beyond just knowing, is that I can stop attacks much earlier.”

OpenText Cloud Editions (CE) 20.4 includes the OpenText Security & Protection Cloud, which provides organizations with a range of new security tools and capabilities. Among these are Webroot BrightCloud Threat Intelligence services and enterprise-focused Carbonite solutions to ensure availability and protect against data losses on endpoints and Microsoft 365 applications.

Watch the session on demand.

Share this post

Share this post to x. Share to linkedin. Mail to
OpenText avatar image

OpenText

OpenText, The Information Company, enables organizations to gain insight through market-leading information management solutions, powered by OpenText Cloud Editions.

See all posts

More from the author

Can CIOs meet today’s challenges and plan for tomorrow?

Can CIOs meet today’s challenges and plan for tomorrow?

Read the new white paper

April 21, 2025

4 min read

From the Great North to global innovation: How OpenText powers the future of tech

From the Great North to global innovation: How OpenText powers the future of tech

The beginning of the year is the perfect time to reflect on one’s successful journey and set our sights on the future. At OpenText, our…

February 28, 2025

3 min read

Why SAST + SCA is the key to protecting your organization in 2025

Why SAST + SCA is the key to protecting your organization in 2025

Software supply chain risk continues to rise—just last year we witnessed a staggering 156% year-over-year increase in malicious software supply chain attacks.

January 17, 2025

4 min read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.